An Integrated Multi-level Security Model for Malicious Attacks Resiliency in Vehicular Ad hoc Network (VANET) - PowerPoint PPT Presentation

About This Presentation
Title:

An Integrated Multi-level Security Model for Malicious Attacks Resiliency in Vehicular Ad hoc Network (VANET)

Description:

Vehicular Ad hoc Network (VANET), as part of Intelligent Transportation System (ITS), has the ability to provide safety and non-safety applications to users on roads for safe, reliable and comfort driving. In this paper, propose an integrated multi-level Security model and core purpose of this model is to provide the resiliency against malicious attack and aim to reduce incidents of road accidents, as well as to ease traffic congestions. – PowerPoint PPT presentation

Number of Views:59

less

Transcript and Presenter's Notes

Title: An Integrated Multi-level Security Model for Malicious Attacks Resiliency in Vehicular Ad hoc Network (VANET)


1
An Integrated Multi-level Security Model for
Malicious Attacks Resiliency in Vehicular Ad hoc
Network (VANET)
  • Dr I.A.Sumra

2
Introduction
  • Vehicular ad-hoc network is a special kind of
    network in which nodes (Vehicles) can communicate
    with each other on the road and with its
    Infrastructure.

V2I
2
3
VANET Applications
  • Safety Applications
  • Non Safety Applications

Work Zone Warning!!!
Work Zone Warning!!!
Work in Progress Plz! use Alt. route
Shopping MALL ( TESCO )
Parking Slot Available!!!
Parking Slot Available!!!
RSU
3
4
VANET Security Requirements
  • Vehicular network applications require security
    and the objective of these applications is to
    serve users and make their journey secure and
    comfortable.
  • Attackers have their own role in this network and
    we cannot predict the dynamic behavior of the
    attacker. If an attacker works on a safety
    application and changes the content of the safety
    message then it poses a very difficult condition
    on the road and many users will be affected due
    to this kind of attack.
  • Accidents are often the result of an alteration
    of any safety message or the sending of even one
    wrong safety message in a network and many human
    lives are at risk 1.

5
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Network Behavior

6
TYPES OF BEHAVIOR IN VEHIUCLAR NETWORK
  • Attacker Behavior

7
Attacker with security goals (CIA) in VANET
8
All Possible attacks on security goals (CIA) in
VANET
9
Attacks on Confidentiality in VANET
  • Monitoring Attack
  • Traffic Analysis Attack
  • Man in the Middle (MiMA) Attack

10
Attacks on Integrity in VANET
Message Alteration Attack
Message Fabrication Attack
Incorrect Data Injecting Attack
11
Scenario One Attack on the integrity of the data
12
Attacks on Availability in VANET
  • DENIAL OF SERVICE (DOS)
  • In VANET, DOS shall not be allowed to happen,
    where seamless life critical information must
    reach its intended destination securely and
    timely. In summary, there are three ways the
    attackers may achieve DOS attacks.
  • There are three levels of DOS attacks as
    described below.
  • Basic Level Overwhelm the Node Resources
  • Extended Level Jamming the Channel

13
DENIAL OF SERVICE (DOS) ATTACK IN VANET
  • Basic Level Overwhelm the Node Resources

14
DENIAL OF SERVICE (DOS) ATTACK IN VANET
  • Extended Level Jamming the Channel

15
Distributed Denial of service (DDOS) Attack
16
Attacks on Availability in VANET
17
Propose Integrated Multi-level Security Model
18
Resiliency measures in integrated Security model
19
Chain of Trust (COT)
  • 1. Trust Inside TPM
  • 2. Trust between TPM and embedded Smart Vehicle
    Sensors
  • 3. Trust between Vehicle to Vehicle (V2V)
  • 4. Trust between Vehicle to RSU (V2R)

20
Chain of Trust (COT)
  • Trust Inside TPM

21
Chain of Trust (COT)
  • 2. Trust between TPM and embedded Smart Vehicle
    Sensors

22
Chain of Trust (COT)
  • 3. Trust between Vehicle to Vehicle (V2V)

23
Case One (TPM with Normal User)
24
Case Two (TPM with Attacker User)
25
User (A) communication with RSU
26
Case Two (Communication with Attacker User)
27
Chain of Trust Process
28
Conclusion
  • Security is the top level module that is always
    demanded for safe and reliable VANET
    communications. However, the dynamic nature of
    the vehicular network makes it difficult to
    identify the attackers, attack types and behavior
    of the attackers.
  • The aim of an attacker is to launch attacks in
    the network and create problems for other users
    to achieve their particular goals. Whenever a
    normal user changes his/her behavior to become an
    attacker and launches an attack, this attack
    would create problems for other components of the
    network and users who utilize that particular
    component(s).
  • Each attack has its own effect level and it is
    very hard to identify that particular attack in a
    particular region of network.

29
Thank you..
29
30
Journal Paper
  • Please download complete research paper from
    research gate.

30
Write a Comment
User Comments (0)
About PowerShow.com